CN115189965B - Cross-chain management system and cross-chain operation method of block chain - Google Patents
Cross-chain management system and cross-chain operation method of block chain Download PDFInfo
- Publication number
- CN115189965B CN115189965B CN202211082288.2A CN202211082288A CN115189965B CN 115189965 B CN115189965 B CN 115189965B CN 202211082288 A CN202211082288 A CN 202211082288A CN 115189965 B CN115189965 B CN 115189965B
- Authority
- CN
- China
- Prior art keywords
- block chain
- information
- interaction
- module
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of information, in particular to a block chain cross-chain management system and a cross-chain operation method, wherein the cross-chain management system comprises a management platform program arranged on each block chain participating in cross-chain management, the management platform program comprises an access module, an audit module and an interaction module, the access module sends an access request to the audit module of an upper block chain, the audit module exchanges block chain identification information, identity verification information and an appointed secret key with the access module after passing the audit, the interaction module periodically sends the interaction request to the upper block chain, the interaction module of the upper block chain establishes encrypted communication connection with the interaction module of the lower block chain after verification, the lower block chain operation information is sent to the upper block chain interaction module, and the upper block chain interaction module generates transaction information to package the lower block chain operation information into a block for storage. The substantial effects of the invention are as follows: the method and the device realize the chain crossing operation and the chain crossing management of the block chain and ensure the running safety of the block chain.
Description
Technical Field
The invention relates to the technical field of information, in particular to a block chain cross-chain management system and a cross-chain operation method.
Background
The block chain technology can establish a natural trust environment, simplify the processing flow of the business, and is continuously developed and applied in recent years. Public chains, private chains and alliance chains are widely used at present. The alliance chain only aims at members of a specific group and limited third parties, a plurality of preselected nodes are internally designated as billers, and generation of each block is jointly determined by all the preselected nodes. Other access nodes may participate in the transaction without asking for the accounting process. The main groups used by the federation chain are banks, insurance, securities, business associations, corporate enterprises, and upstream and downstream enterprises. More and more block chains are deployed in the same enterprise, so that the interoperation between chains is more and more frequent. In order to facilitate the business operation of the cross-blockchain system, it is necessary to research cross-chain management and operation technology.
For example, chinese patent CN113228076a, published 2021, 8 and 6, discloses a block chain management system. It can implement cross-chain transactions, but cannot implement cross-chain management and operation.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the technical problem of lack of a block chain cross-chain management and operation scheme with safety and convenience at present. The provided system and method for managing and operating the block chain across the chain can facilitate the chain-crossing management and the chain-crossing operation of the block chain on the premise of ensuring the safe operation of the block chain.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a management platform program is arranged on each block chain participating in cross-chain management, the management platform program runs on each node of the block chain, the management platform program comprises an access module, an audit module and an interaction module, any node of the block chain which is supposed to be a subordinate sends an access request to the audit module of an upper block chain through the access module, after the audit module passes, the management platform program exchanges block chain identification information, identity verification information and an appointed secret key with the access module and respectively sends the block chain identification information, the identity verification information and the appointed secret key to the interaction module of the upper block chain for storage, the interaction module of the lower block chain periodically sends the interaction request to the interaction module of the upper block chain, the interaction request comprises block chain identification information and identity verification information, after the interaction module of the upper block chain verifies, the encryption communication connection is established with the interaction module of the lower block chain, the lower block chain interaction module sends the operation information of the lower block chain to the interaction module of the upper block chain, and the interaction module of the upper block chain generates the transaction information and packages the operation information of the lower block chain into a block chain.
Preferably, the block chain identification information is a unique identification ID of a block chain, the unique identification ID is obtained by applying to a node of any block chain running with a management platform program when the block chain is created, the identification information includes attribute verification information and ciphertext verification information, the attribute verification information is identification information, block chain type information and service attribute information distributed to a subordinate block chain by a superior block chain when a superior-subordinate relationship is established, the ciphertext verification information is paired secret key information appointed between the superior block chain and the subordinate block chain, when an interaction request sent by the subordinate block chain interaction module is received by the superior block chain interaction module, whether the unique identification ID, the identification information, the block chain type information and the service attribute information carried by the interaction request are matched with stored information is verified, if the secret key information is not matched, interaction is rejected, if the secret key information is matched, the encryption secret key carried by the interaction request is generated, the secret key encrypted by the agreed secret key is sent to the subordinate block chain interaction module, and the encrypted secret key of the superior block chain interaction module is sent to the subordinate block chain interaction module after the encryption key interaction module runs.
Preferably, the interactive module of the node of the superior blockchain sends a data interactive request to the interactive module of the node of the inferior blockchain, the data interactive request includes attribute verification information, ciphertext verification information, a data interactive instruction and an interactive secret key, the inferior blockchain interactive module verifies whether the attribute verification information is matched with the inferior blockchain, if not, interaction is rejected, if matching, the ciphertext verification information is verified, if verification is not passed, interaction is rejected, if verification is passed, the data interactive instruction in the data interactive request is executed, read data is encrypted by using the interactive secret key and then fed back to the node of the superior blockchain, and the superior blockchain node stores the obtained data locally.
Preferably, the data interaction instruction comprises a current block height reading instruction, a specified block data reading instruction, a transaction specifying transaction information verifying instruction and a transaction information adding instruction, each data interaction instruction is associated with an permission authority level, an interaction module of a lower-level block chain stores an authority table, and the authority table records authority levels corresponding to block chain identification information.
Preferably, after the audit module of the upper block chain audits that the access request passes, the audit module of the upper block chain generates an encryption polynomial f (x), generates a value set E of an independent variable x, calculates a polynomial value of the encryption polynomial f (x) on the value set E, generates an equivalent polynomial f '(x), when the polynomial value of the equivalent polynomial f' (x) on the value set E is the same as that of the encryption polynomial f (x), sends the equivalent polynomial f '(x) to the access module of the lower block chain, and when the upper block chain interaction module receives the interaction request sent by the lower block chain interaction module, verifies the attribute verification information, randomly generates a plurality of values of the independent variable x, wherein x belongs to E, sends the plurality of values of the independent variable x to the lower block chain interaction module, and after the lower block chain interaction module receives the equivalent polynomial f' (x), obtains the polynomial value of the equivalent polynomial f '(x), and feeds back the polynomial f' (x) to the upper block chain interaction module, and if the equivalent polynomial f '(x) matches the corresponding verification information, the equivalent polynomial f' (x) is judged that the corresponding verification information does not match the corresponding verification polynomial f (x).
Alternatively, after the access request is passed through by the audit module of the upper block chain, the audit module of the upper block chain generates a decimal g, a positive odd c and a positive odd d, so that g × c = (2*k × pi) _ N, k is a positive integer, N represents that the number in the parentheses is reserved with N decimal places, the positive odd d is sent to the access module of the lower block chain, when the upper block chain interaction module receives the interaction request sent by the lower block chain interaction module, the attribute verification information is verified, an integer m is randomly generated, an intermediate value P1= (cos (g × m)) _ N is calculated, the intermediate value P1 is sent to the interaction module of the lower block chain, the lower block chain interaction module calculates an intermediate value P2= (cos (d × m)) _ N by using an angle multiplication formula of a cosine function, sends the intermediate value P2= (s (d = g × m)) _ N to the interaction module of the upper block chain, and otherwise, the absolute verification result that the difference value P3 is smaller than the absolute verification result that the cosine interaction module of the absolute verification result is judged by using a cosine function.
Preferably, after the audit of the node of the superior block chain receiving the access request passes, the access request and the audit result are signed and then broadcast in the superior block chain network, the audit modules of the nodes of other superior block chains audit the access request, if the audit result is consistent with the broadcast audit result, the node signature is added after the broadcast, after the signatures of the preset number of nodes are collected, the audit result of the access request is confirmed, then the node of the superior block chain receiving the access request exchanges block chain identification information, identity verification information and an appointed secret key with the access module of the inferior block chain, the appointed block chain identification information, identity verification information and the appointed secret key are broadcast to each node of the superior block chain, and then the interaction module of the inferior block chain node can perform data interaction with the interaction module of any node of the superior block chain.
A method for performing a cross-chain operation of a blockchain on a system for managing the cross-chain of blockchains as described above, comprising the steps of: running interactive programs on the two block chains, and exchanging block chain identification information, identity authentication information and an appointed secret key between the interactive programs of the two block chains, wherein the identity authentication information comprises attribute authentication information and ciphertext authentication information; the method comprises the steps that a block chain node generates an operation request and sends the operation request to any node of an operated block chain, wherein the operation request comprises attribute verification information, ciphertext verification information, a data interaction instruction and an interaction secret key; and if the node verification attribute verification information and the ciphertext verification information of the operated block chain pass, executing the data interaction instruction, encrypting the result of the data interaction instruction by using the interaction secret key, and feeding back the result to the block chain link point sending the operation request.
Preferably, the data interaction instruction comprises a current block height reading instruction, a specified block data reading instruction, a transaction specifying transaction information verifying instruction and a transaction information adding instruction, each data interaction instruction is associated with an permission authority level, an interaction program of a block chain stores an authority table, and the authority table records the authority level corresponding to the block chain identification information.
Preferably, the method of generating the ciphertext verification information includes: the interactive program of one block chain generates decimal g, positive odd number c and positive odd number d, so that g c d = (2*k × pi) _ N, k is a positive integer, N represents that the number in the parentheses retains N-bit decimal, the positive odd number d is sent to the interactive program of another block chain, when the interactive program of the operated block chain receives an operation request, attribute verification information is verified, if the verification is not passed, no operation is performed, otherwise, an integer m is randomly generated, an intermediate value P1= (cos (g × m)) _ N is calculated, an intermediate value P1 is sent to the interactive program of the block chain sending the operation request, the interactive program of the block chain sending the operation request uses an angle formula of a cosine function to calculate an intermediate value P2= (cos (d g × m)) _ N, the intermediate value P2 is sent to the interactive program of the operated block chain, the interactive program of the operated block chain uses an angle formula of the cosine function to calculate an intermediate value P2= (cos (d g × m)) _ N), otherwise, the interactive program determines that the data is smaller than the absolute verification information of an absolute verification result, and if the absolute verification information is smaller than the difference value P3, otherwise, the interactive program determines that the absolute verification result is smaller than the absolute verification result.
The substantial effects of the invention are as follows: by establishing a cross-chain interaction or operation mechanism and an identity verification mechanism, cross-chain operation and cross-chain management of the block chain are realized, and the operation safety of the block chain is ensured; the efficient management of a plurality of service block chains is realized through chain-crossing management, the efficient and safe operation of the service block chains is guaranteed, and the production efficiency is improved; the safety of cross-chain management and cross-chain operation is guaranteed through an improved identity authentication mechanism.
Drawings
FIG. 1 is a diagram illustrating an exemplary cross-chain management system.
FIG. 2 is a schematic diagram illustrating an embodiment of a management platform process.
FIG. 3 is a diagram illustrating an interactive request according to an embodiment.
FIG. 4 is a diagram illustrating data interaction according to an embodiment.
FIG. 5 is a flowchart illustrating a cross-chain operation method according to an embodiment.
Fig. 6 is a flowchart illustrating a method for generating ciphertext verification information according to the second embodiment.
Wherein: 100. the system comprises a block chain, 200, a management platform program, 1, an access module, 2, an auditing module, 3, an interaction module, 4, an interaction request, 41, block chain identification information, 42, identity verification information, 411, a unique identification ID,421, attribute verification information, 422, cipher text verification information, 4211, identity information, 4212, block chain type information, 4213, service attribute information, 4221 and secret key information.
Detailed Description
The following provides a more detailed description of the present invention, with reference to the accompanying drawings.
The first embodiment is as follows:
referring to fig. 1, the system for managing a blockchain across links includes a management platform program 200 provided on each blockchain 100 participating in the management across links, where the management platform program 200 is run on each node of the blockchain 100. Referring to fig. 2, the management platform program 200 includes an access module 1, an audit module 2, and an interaction module 3, where any node of a lower-level block chain is supposed to send an access request to the audit module 2 of the upper-level block chain through the access module 1, after the audit by the audit module 2 is passed, the access module 1 exchanges block chain identification information 41, identity authentication information 42, and an agreement key with the audit module 2, and sends the block chain identification information, the identity authentication information 42, and the agreement key to the interaction module 3 of the upper-level block chain for storage, and the interaction module 3 of the lower-level block chain periodically sends an interaction request 4 to the interaction module 3 of the upper-level block chain.
Such as blockchain a and blockchain B, need to be managed over blockchain C. I.e., blockchain C is the upper blockchain of blockchain a and blockchain B, then the management platform program 200 of either node of blockchain a and blockchain B initiates an access request to blockchain C. The access request is first broadcast and signature collected between the nodes of blockchain a and blockchain B themselves. After a predetermined number of signatures are collected, the access request to the blockchain C is confirmed by most of the nodes of the blockchain a and the blockchain B, and the node that broadcasts the access request first sends the access request to the management platform program 200 of any node of the blockchain C. And receiving node audit of the block chain C of the access request, if the audit is not passed, not operating, if the audit is passed, broadcasting the access request and an audit result among the nodes of the block chain C, and after a preset number of node signatures are obtained, considering that the access request is confirmed by the block chain C, and completing the access of the block chain A and the block chain B.
When the auditing module 2 audits the access request, it audits whether the block chain identification information 41 is identification information allowing access, or whether the format of the block chain identification information 41 meets the requirement of a preset format. The blockchain that needs to be managed across chains is usually a federation chain or a private chain, and there is a business relationship or association between chains. When a new block chain is deployed, the block chain identification information 41 of the new block chain is set according to a preset format, and when the newly deployed block chain sends an access request, the auditing module 2 of the superior block chain audits whether the block chain identification information 41 meets the preset format, so that whether the block chain which sends the access request is an associated block chain can be judged. If the block chain identification information 41 conforms to the preset format, the audit is passed, otherwise, the audit is not passed.
Alternatively, when a new blockchain is deployed, a blockchain identifier is given to the blockchain, and the blockchain identifier is submitted to an existing blockchain for packing and storing. When a newly deployed block chain sends an access request, a superior block chain queries data in the block, if a consistent block chain identifier exists, it is determined that the block chain identifier 41 is identifier information allowing access, and the access request is approved, otherwise, if the consistent block chain identifier 41 is not queried in the block, the access request is not approved.
Referring to fig. 3, the interactive request 4 includes block chain identification information 41 and identity verification information 42, the interactive module 3 of the upper block chain establishes an encrypted communication connection with the interactive module 3 of the lower block chain after verification, the lower block chain interactive module 3 sends the lower block chain running information to the interactive module 3 of the upper block chain, and the interactive module 3 of the upper block chain generates transaction information and packages the lower block chain running information into blocks for storage.
The running information sent by the lower block chain comprises the high and recent block-out time and the health state of the current block. Health status is a health assessment of one chain by the management platform program 200, namely: if all node states of a certain chain are normal, the health state of the chain is 'normal'; if the partial node status is abnormal, then the health status of the chain is "Warning"; the health of the chain is "faulty" if all of the abnormal or abnormal nodes exceed all of the nodes by a preset percentage.
The block chain identification information 41 is a unique identification ID411 of a block chain, when the unique identification ID411 is created by the block chain, the unique identification ID is applied to a node running any one block chain of the management platform program 200 to obtain, the authentication information 42 includes attribute authentication information 421 and cipher text authentication information 422, when the attribute authentication information 421 establishes a superior-subordinate relationship, the superior block chain distributes the identity information 4211, the block chain type information 4212 and the business attribute information 4213 to the inferior block chain, the cipher text authentication information 422 is paired key information 4221 appointed between the superior block chain and the inferior block chain, when the superior block chain interaction module 3 receives an interaction request 4 sent by the inferior block chain interaction module 3, the unique identification ID411, the identity information 4211, the block chain type information 4212 and the business attribute information 4213 carried by the interaction request 4 are verified to be matched with stored, if the unique identification information is not matched, interaction is rejected, if the unique identification ID411, the block chain identification information carried by the interaction request 4 is matched, if the authentication is not passed, the key is generated, the key of the superior block chain interaction module is sent to the encryption module after the interaction module passes the encryption key chain, and the encryption module sends the encryption key of the superior block chain to the interaction module. The attribute information of the block chain A is as follows: { identity information 4211. Namely, the blockchain C allocates one piece of identity information 4211, subc-r-A to the blockchain A, and the format and allocation rule of the identity information 4211 are set by the blockchain C. If the block chain a is a private chain, the block chain type information 4212 is the private chain. The service attribute of the block chain A is a sales service data chain. The blockchain C can obtain the sales data condition recorded on the blockchain a through the blockchain C by interacting with the blockchain a.
The interactive module 3 of the node of the upper block chain sends a data interaction request to the interactive module 3 of the node of the lower block chain, please refer to fig. 4, where the data interaction request includes attribute verification information 421, ciphertext verification information 422, a data interaction instruction and an interaction key, the interactive module 3 verifies whether the attribute verification information 421 matches with the lower block chain, if not, the interaction is rejected, if matching, the ciphertext verification information 422 is verified, if verification does not pass, the interaction is rejected, if verification passes, the data interaction instruction in the data interaction request is executed, read data is encrypted by using the interaction key and then fed back to the node of the upper block chain, and the link point of the upper block chain stores the obtained data locally. The upper block chain can not only periodically receive the running information sent by the lower block chain, but also actively inquire the information of the lower block chain. The data interaction request is sent to the interaction module 3 of any node of the lower block chain, after the attribute verification information 421 and the ciphertext verification information 422 carried by the data interaction request pass through, the node of the lower block chain executes a data interaction instruction to query and acquire the data, and then the data interaction instruction is encrypted by using an interaction secret key and sent to the node sending the data interaction request. And the data obtained by the data interaction instruction query is stored locally in the node of the superior block chain initiating the data interaction request. The attribute verification information 421 of the data interaction request refers to the attribute information of the lower block chain, and if the lower block chain verification matches the own attribute information, the verification is passed. The ciphertext verification information 422 is ciphertext verification information 422 agreed between the upper block chain and the lower block chain when the upper and lower relationships are established. Such as specifying a string password, specifying a function of a timestamp, specifying a function of the height of the next level block, etc. The present embodiment is illustrated by way of a contract encryption function.
The data interaction instruction comprises a current block height reading instruction, a specified block data reading instruction, a transaction specified transaction information verifying instruction and a transaction information adding instruction, each data interaction instruction is associated with an allowed permission level, the interaction module 3 of the lower-level block chain stores a permission table, and the permission table records permission levels corresponding to the block chain identification information 41. As a preferred embodiment, the permission level of the read current block height command and the verification transaction designation transaction information command is 1, the permission level of the read designation block data command is 2, and the permission level of the addition transaction information command is 2. If the authority level of the upper block chain to the lower block chain is 1, the upper block chain can only read the current block height instruction and verify the transaction designated transaction information instruction to the lower block chain. The operation authority of the upper block chain to the lower block chain can be conveniently set through the authority table, and management of a plurality of block chains is facilitated.
After the audit module 2 of the upper block chain passes the audit request, the audit module 2 of the upper block chain generates an encryption polynomial f (x), generates a value set E of an independent variable x, calculates a polynomial value of the encryption polynomial f (x) on the value set E, generates an equivalent polynomial f '(x), when the polynomial value of the equivalent polynomial f' (x) on the value set E is the same as that of the encryption polynomial f (x), sends the equivalent polynomial f '(x) to the access module 1 of the lower block chain, when the upper block chain interaction module 3 receives the interaction request 4 sent by the lower block chain interaction module 3, verifies the attribute verification information 421, randomly generates a plurality of values of the independent variable x, x belongs to the E, sends the plurality of values of the independent variable x to the lower block chain interaction module 3, after the lower block chain interaction module 3 receives the equivalent polynomial f' (x), substitutes the plurality of values of the independent variable x into the equivalent polynomial f '(x), obtains the polynomial f' (x) value of the equivalent polynomial f '(x), and feeds back the equivalent polynomial f' (x) to the upper block chain interaction module 422, and judges whether the equivalent polynomial f (x) conforms to the corresponding verification information if the equivalent polynomial f (f) of the corresponding verification module 422. And (3) setting a value set E = {2,3,4,6,8,9,12} for the encryption polynomial f (x) =5 x ^2-24 x +16, and then setting the value range of the encryption polynomial on the value set E as { -12, -11,0,52,144,205,448}. The corresponding equivalent polynomial formula f' (x) = -0.00000116 x ^8+0.00007 x ^7-0.0017 x ^6+0.0234 x ^5-0.186 x ^4+0.893 x ^3+2.5 x ^2-20.23 x ^ 13.69 is generated.
When the upper block chain interaction module 3 receives the interaction request 4 sent by the lower block chain interaction module 3, after verifying the attribute verification information 421, it randomly generates values of a plurality of arguments x, such as x =2,3 and 6, and sends x =2,3 and 6 to the lower block chain interaction module 3, and after the lower block chain interaction module 3 receives the values of a plurality of arguments x, it substitutes the equivalent polynomial f '(x), that is, f' (x) = -0.00000116 x ^8+0.00007 x ^7-0.0017 x ^6+0.0234 x ^5-0.186 x 4 x +0.893 x ^3 x 2.5 x 2-20.23 ^ x +13.69. F ' (2) = -11.95333696, f ' (6) = -10.86262076 and f ' (6) =54.43236544 are obtained. The error rates of the three polynomial values are calculated to be (12-11.95333696)/12 =0.38%, (11-10.86262076)/11 =1.2% and (54.43236544-52)/52 =4.6%, respectively, and the errors are all less than 10, and then the polynomial value of f' (x) is determined to be consistent with the corresponding encryption polynomial f (x).
After the audit of the node of the superior block chain receiving the access request passes, the access request and the audit result are signed and then broadcast in the superior block chain network, the audit modules 2 of the nodes of other superior block chains audit the access request, if the audit result is consistent with the broadcast audit result, the node signature is added after the broadcast, after the signatures of the preset number of nodes are collected, the audit result of the access request is confirmed, then the node of the superior block chain receiving the access request exchanges block chain identification information 41, identity verification information 42 and an appointment secret key with the access module 1 of the inferior block chain, the appointment block chain identification information 41, the identity verification information 42 and the appointment secret key are broadcast to each node of the superior block chain, and then the interaction module 3 of the inferior block chain node can perform data interaction with the interaction module 3 of any node of the superior block chain.
A method for performing a cross-chain operation of a blockchain, referring to fig. 5, comprising the steps of: step A01) running interactive programs on two block chains, exchanging block chain identification information 41, identity authentication information 42 and an appointed secret key between the interactive programs of the two block chains, wherein the identity authentication information 42 comprises attribute authentication information 421 and ciphertext authentication information 422; step A02) generating an operation request by the block chain link point, and sending the operation request to any node of the operated block chain, wherein the operation request comprises attribute verification information 421, ciphertext verification information 422, a data interaction instruction and an interaction secret key; and step A03) if the node verification attribute verification information 421 and the ciphertext verification information 422 of the operated block chain pass, executing the data interaction instruction, encrypting the result of the data interaction instruction by using the interaction secret key, and feeding back the result to the block chain link point sending the operation request. By running the interactive program on the block chain node and according to the preset interactive information format and the verification information, the chain crossing operation of the block chain can be realized, the chain crossing management among a plurality of block chains is realized, the management and the running of a plurality of block chains in the same service are facilitated, and the service efficiency is improved.
The data interaction instruction comprises a current block height reading instruction, a specified block data reading instruction, a transaction specified transaction information verifying instruction and a transaction information adding instruction, each data interaction instruction is associated with an allowed permission level, an interaction program of a block chain stores a permission table, and the permission table records permission levels corresponding to block chain identification information 41.
The substantial effect of the embodiment is as follows: by establishing a cross-chain interaction or operation mechanism and an identity verification mechanism, cross-chain operation and cross-chain management of the block chain are realized, and the operation safety of the block chain is ensured; the efficient management of a plurality of service block chains is realized through chain-crossing management, the efficient and safe operation of the service block chains is guaranteed, and the production efficiency is improved; the safety of cross-chain management and cross-chain operation is guaranteed through an improved identity authentication mechanism.
Example two:
a system for managing a block chain across chains, which provides a new scheme for generating ciphertext verification information 422 based on the first embodiment. In this embodiment, after the access request is passed through by the audit module 2 of the upper block chain, the audit module 2 of the upper block chain generates a decimal g, a positive odd c and a positive odd d, so that g × c = (2*k × pi) _ N, k is a positive integer, N represents that the number in the parentheses retains N-bit decimal, the positive odd d is sent to the access module 1 of the lower block chain, when the upper block chain interaction module 3 receives the interaction request 4 sent by the lower block chain interaction module 3, the attribute verification information 421 is verified, then an integer m is randomly generated, an intermediate value P1= (cos (g = m)) _ N is calculated, the intermediate value P1 is sent to the interaction module 3 of the lower block chain, the lower block chain interaction module 3 calculates the intermediate value P2= (cos (d = g = m)) _ N by using the octave formula of the cosine function, and the intermediate value P2= (c = m) _ N) is sent to the interaction module 3, and the upper block chain interaction module determines that the intermediate value P2= (s = m) _ N) is smaller than the absolute verification information 422, otherwise, and the absolute verification information is determined by using the octave interaction verification function.
A method for performing a cross-chaining operation on a blockchain provides an alternative to generating the ciphertext verification information 422, as compared to the first embodiment. Referring to fig. 6, in the present embodiment, the method for generating the ciphertext verification information 422 includes: step B01) the interactive program of one block chain generates decimal g, positive odd number c and positive odd number d, so that g c d = (2*k pi) _ N, k is a positive integer, N represents the number in the bracket to reserve N decimal, and the positive odd number d is sent to the interactive program of the other block chain; step B02) when the interactive program of the operated block chain receives the operation request, verifying the attribute verification information 421, if the verification is not passed, not operating, otherwise, randomly generating an integer m; step B03) calculating an intermediate value P1= (cos (g × m)) _ N, and sending the intermediate value P1 to the interactive program of the blockchain that sent the operation request; step B04) the interactive program of the block chain sending the operation request uses the angle multiplication formula of the cosine function to calculate an intermediate value P2= (cos (d × g × m)) _ N, and sends the intermediate value P2 to the interactive program of the operated block chain; step B05) the interactive program of the operated block chain calculates the intermediate value P3= (cos (c × d × g × m)) _ N using the formula of the multiple angle of the cosine function; and B06) if the absolute value of the difference value between P3 and 1 is smaller than the preset threshold epsilon, judging that the ciphertext verification information 422 passes verification, and executing the data interaction instruction, otherwise, judging that the ciphertext verification information 422 fails verification.
Decimal g =388.95909, positive odd number c =7 and positive odd number d =3 are set in the present embodiment, and g × c × d =8168.14089= (2 × 1300 × pi) _ N =8168.14089 is satisfied, where N takes a value of 5. Preset threshold epsilon =0.001.
After receiving the operation request, the interactive program of the operated blockchain verifies the attribute verification information 421, and after the verification is passed, the ciphertext verification information 422 is continuously verified. The interactive program of the operated blockchain generates an integer m =5, and calculates an intermediate value P1= (cos (g × m)) _ N = (cos (388.95909 × 5)) _ N = -0.98883. P1= -0.98883 to the interactive program that sends the blockchain of operation requests. The interactive program of the blockchain sending the operation request calculates an intermediate value P2= (cos (d × g × m)) _ N = (4 × P1^3-3 × P1) _ N = -0.900961652 using an angle-doubling formula of a cosine function. And then feeding back the intermediate value P2 to the interactive program of the operated blockchain. The interactive program of the operated block chain calculates an intermediate value P3= (cos (c × d × g × m)) _ N = (64 × P2^7-112 × P2^5+56 × P2^3-7 × P2) _ N =0.99999 by using the angle doubling formula of the cosine function. And if the difference between the intermediate value P3 and 1 is smaller than the preset threshold value epsilon =0.001, the ciphertext verification information 422 is judged to pass the verification.
Compared with the first embodiment, the ciphertext verification information 422 provided by the present embodiment has higher security, and further improves the security of block chain cross-chain management and cross-chain operation.
The above-described embodiments are only preferred embodiments of the present invention, and are not intended to limit the present invention in any way, and other variations and modifications may be made without departing from the spirit of the invention as set forth in the claims.
Claims (10)
1. A block chain cross-chain management system is used for cross-chain management of a plurality of alliance chains and/or private chains,
the management platform program is arranged on each block chain participating in cross-chain management, the management platform program runs on each node of the block chain, the management platform program comprises an access module, an auditing module and an interaction module, any node of the block chain which is supposed to be a subordinate sends an access request to the auditing module of the superior block chain through the access module, after the auditing module passes the auditing, the auditing module exchanges block chain identification information, identity verification information and an appointed secret key with the access module and respectively sends the information to the respective interaction module for storage, the interaction module of the subordinate block chain periodically sends the interaction request to the interaction module of the superior block chain, the interaction request comprises block chain identification information and identity verification information, the interaction module of the superior block chain establishes encrypted communication with the interaction module of the subordinate block chain after verification, the interaction module of the subordinate block chain sends the subordinate block chain running information to the interaction module of the superior block chain, and the interaction module of the superior block chain generates transaction information and packs the subordinate block chain running information for storage.
2. The system for block chain cross-chain management according to claim 1,
the block chain identification information is a unique identification ID of a block chain, when the block chain is established, the unique identification ID is obtained by applying to a node of any block chain running with a management platform program, the identity verification information comprises attribute verification information and ciphertext verification information, when the attribute verification information is used for establishing a superior-subordinate relationship, the identity information, the block chain type information and the service attribute information distributed to a subordinate block chain by a superior block chain are verified, the ciphertext verification information is paired secret key information appointed between the superior block chain and the subordinate block chain, when an interaction request sent by the subordinate block chain interaction module is received by the superior block chain interaction module, whether the unique identification ID, the identity information, the block chain type information and the service attribute information carried by the interaction request are matched with the stored secret key information or not is verified, if the mutual information is not matched, the verification information carried by the interaction request is verified, if the mutual verification is not passed, the mutual verification is denied, if the mutual verification is passed, the current secret key is generated, the secret key is sent to the subordinate block chain by the secret key, and the block chain interaction module sends the block chain running secret key information to the superior block chain interaction module after the block chain interaction module passes the verification.
3. The system of claim 2, wherein the block chain management unit is further configured to,
the method comprises the steps that an interactive module of a node of a superior block chain sends a data interactive request to an interactive module of a node of a subordinate block chain, the data interactive request comprises attribute verification information, ciphertext verification information, a data interactive instruction and an interactive secret key, the subordinate block chain interactive module verifies whether the attribute verification information is matched with the subordinate block chain, interaction is refused if the attribute verification information is not matched with the subordinate block chain, the ciphertext verification information is verified if the attribute verification information is matched with the subordinate block chain, interaction is refused if the attribute verification is not passed, the data interactive instruction in the data interactive request is executed if the attribute verification is passed, read data are encrypted by the interactive secret key and then fed back to the node of the superior block chain, and the superior block chain link stores the obtained data locally.
4. The system for block chain cross-chain management according to claim 3,
the data interaction instruction comprises a current block height reading instruction, a specified block data reading instruction, a transaction specified transaction information verifying instruction and a transaction information adding instruction, each data interaction instruction is associated with an allowed authority level, an interaction module of a lower-level block chain stores an authority table, and the authority table records the authority levels corresponding to block chain identification information.
5. The system for managing block chains according to any one of claims 2 to 4,
after an audit module of a superior block chain audits an access request, an audit module of the superior block chain generates an encryption polynomial f (x), generates a value set E of an independent variable x, calculates a polynomial value of the encryption polynomial f (x) on the value set E, and generates an equivalent polynomial f '(x), when the polynomial value of the equivalent polynomial f' (x) on the value set E is the same as the encryption polynomial f (x), the equivalent polynomial f '(x) is sent to an access module of a subordinate block chain, when the superior block chain interaction module receives an interaction request sent by the subordinate block chain interaction module, after verifying attribute verification information, the values of a plurality of independent variables x are randomly generated, the polynomial x belongs to the polynomial E, the values of the plurality of independent variables x are sent to the subordinate block chain interaction module, after the superior block chain interaction module receives the equivalent polynomial f' (x), the values of the plurality of independent variables x are obtained, the equivalent polynomial f '(x) is fed back to the superior block chain interaction module, and if the equivalent polynomial f' (x) is consistent with the corresponding verification information, the corresponding verification polynomial f (x) is judged.
6. The system for managing block chains according to any one of claims 2 to 4,
after an audit module of a superior block chain passes an audit access request, the audit module of the superior block chain generates decimal g, positive odd c and positive odd d, so that g c d = (2*k ≧ pi) _ N, k is a positive integer, N represents that the number in brackets retains N-bit decimal, the positive odd d is sent to an access module of a subordinate block chain, when the superior block chain interaction module receives an interaction request sent by the subordinate block chain interaction module, an integer m is randomly generated after verifying attribute verification information, an intermediate value P1= (cos (g m)) _ N is calculated, an intermediate value P1 is sent to an interaction module of the subordinate block chain, the subordinate block chain interaction module calculates an intermediate value P2= (cos (d g m)) _ N using an angle multiplier formula of a cosine function, the intermediate value P2 is sent to the superior block chain interaction module, the superior block chain interaction module uses a cosine function octagon formula to calculate an intermediate value P3= (s (d g m)) _ N), and otherwise, the absolute verification result is judged that the difference value is smaller than the absolute verification result that the absolute verification result is judged by the absolute verification result that the difference value P3= (s _).
7. The system for managing block chains across chains according to any one of claims 1 to 4,
after the audit of the node of the superior block chain receiving the access request passes, the access request and the audit result are signed and then broadcast in the superior block chain network, the audit modules of the nodes of other superior block chains audit the access request, if the audit result is consistent with the broadcast audit result, the node signature is added after the broadcast, after the signatures of the preset number of nodes are collected, the audit result of the access request is confirmed, then the node of the superior block chain receiving the access request exchanges block chain identification information, identity verification information and an appointed secret key with the access module of the inferior block chain, the appointed block chain identification information, identity verification information and the appointed secret key are broadcast to each node of the superior block chain, and then the interaction module of the inferior block chain node can perform data interaction with the interaction module of any node of the superior block chain.
8. A method of inter-chain operation of a blockchain performed on an inter-chain management system of a blockchain according to any one of claims 3 to 7,
the method comprises the following steps:
running interactive programs on the two block chains, and exchanging block chain identification information, identity authentication information and an appointed secret key between the interactive programs of the two block chains, wherein the identity authentication information comprises attribute authentication information and ciphertext authentication information;
the method comprises the steps that a block chain node generates an operation request and sends the operation request to any node of an operated block chain, wherein the operation request comprises attribute verification information, ciphertext verification information, a data interaction instruction and an interaction secret key;
and if the node verification attribute verification information and the ciphertext verification information of the operated block chain pass, executing a data interaction instruction, encrypting a data interaction instruction result by using an interaction secret key, and feeding back the result to the block chain link point for sending the operation request.
9. The method of claim 8,
the data interaction instruction comprises a current block height reading instruction, a specified block data reading instruction, a transaction specified transaction information verifying instruction and a transaction information adding instruction, each data interaction instruction is associated with an allowed permission level, an interaction program of a block chain stores a permission table, and the permission table records permission levels corresponding to block chain identification information.
10. The method of claim 8 or 9,
the method for generating the ciphertext verification information comprises the following steps: the interactive program of one block chain generates decimal g, positive odd number c and positive odd number d, so that g c d = (2*k × pi) _ N, k is a positive integer, N represents that the number in the parentheses retains N-bit decimal, the positive odd number d is sent to the interactive program of another block chain, when the interactive program of the operated block chain receives an operation request, attribute verification information is verified, if the verification is not passed, no operation is performed, otherwise, an integer m is randomly generated, an intermediate value P1= (cos (g × m)) _ N is calculated, an intermediate value P1 is sent to the interactive program of the block chain sending the operation request, the interactive program of the block chain sending the operation request uses an angle formula of a cosine function to calculate an intermediate value P2= (cos (d g × m)) _ N, the intermediate value P2 is sent to the interactive program of the operated block chain, the interactive program of the operated block chain uses an angle formula of the cosine function to calculate an intermediate value P2= (cos (d g × m)) _ N), otherwise, the interactive program determines that the data is smaller than the absolute verification information of an absolute verification result, and if the absolute verification information is smaller than the difference value P3, otherwise, the interactive program determines that the absolute verification result is smaller than the absolute verification result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211082288.2A CN115189965B (en) | 2022-09-06 | 2022-09-06 | Cross-chain management system and cross-chain operation method of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211082288.2A CN115189965B (en) | 2022-09-06 | 2022-09-06 | Cross-chain management system and cross-chain operation method of block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115189965A CN115189965A (en) | 2022-10-14 |
CN115189965B true CN115189965B (en) | 2022-12-13 |
Family
ID=83523092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211082288.2A Active CN115189965B (en) | 2022-09-06 | 2022-09-06 | Cross-chain management system and cross-chain operation method of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115189965B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116933327A (en) * | 2023-07-05 | 2023-10-24 | 浙江工业大学 | Data tracing method under cross-link scene |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112766740A (en) * | 2021-01-22 | 2021-05-07 | 湖南工商大学 | Public safety emergency information block chain sharing model and method based on side chain |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11048813B2 (en) * | 2018-08-29 | 2021-06-29 | Nucleus Vision, Llc | Method and system for managing consent data in a blockchain network |
US11250507B2 (en) * | 2019-02-20 | 2022-02-15 | Apifiny Group Inc. | Trusted tokenized transactions in a blockchain system |
CN109934592A (en) * | 2019-03-22 | 2019-06-25 | 深圳市网心科技有限公司 | A kind of across the chain communication means of block chain, system, electronic equipment and storage medium |
CN110266655B (en) * | 2019-05-30 | 2021-11-12 | 中国工商银行股份有限公司 | Cross-chain interconnection method, device and system based on block chain |
CN112435024B (en) * | 2020-11-17 | 2022-06-10 | 浙江大学 | Alliance chain cross-chain privacy protection method based on group signature and CA multi-party authentication |
CN112491846B (en) * | 2020-11-18 | 2023-04-18 | 深圳前海微众银行股份有限公司 | Cross-chain block chain communication method and device |
CN112667601B (en) * | 2020-12-30 | 2023-06-20 | 杭州趣链科技有限公司 | Block chain identification management method, terminal equipment and computer readable storage medium |
CN113922971B (en) * | 2021-06-02 | 2023-10-27 | 支付宝(杭州)信息技术有限公司 | Cross-chain interaction method and device |
CN113590718B (en) * | 2021-09-23 | 2022-11-08 | 南京慧链和信数字信息科技研究院有限公司 | Trusted data chain crossing system based on block chain all-in-one machine |
CN114285635A (en) * | 2021-12-23 | 2022-04-05 | 杨波 | Intelligent contract-based identity management system for participants on block chain |
CN114615095B (en) * | 2022-05-12 | 2022-09-09 | 北京邮电大学 | Block chain cross-chain data processing method, relay chain, application chain and cross-chain network |
-
2022
- 2022-09-06 CN CN202211082288.2A patent/CN115189965B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112766740A (en) * | 2021-01-22 | 2021-05-07 | 湖南工商大学 | Public safety emergency information block chain sharing model and method based on side chain |
Non-Patent Citations (1)
Title |
---|
区块链跨链技术进展研究;李芳等;《软件学报》;20190327(第06期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115189965A (en) | 2022-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111797159B (en) | Information management and access control in a database | |
CN110012015B (en) | Block chain-based Internet of things data sharing method and system | |
US20230023857A1 (en) | Data processing method and apparatus, intelligent device, and storage medium | |
CN110933108B (en) | Data processing method and device based on block chain network, electronic equipment and storage medium | |
AU2017272163B2 (en) | Verification system and method with extra security for lower-entropy input records | |
CN107171794B (en) | A kind of electronic document signature method based on block chain and intelligent contract | |
CN110288480B (en) | Private transaction method and device for blockchain | |
CN112311735B (en) | Credible authentication method, network equipment, system and storage medium | |
CN112311772B (en) | Hyperridge-based cross-domain certificate management system and method | |
CN108667612B (en) | Trust service architecture and method based on block chain | |
US10846372B1 (en) | Systems and methods for trustless proof of possession and transmission of secured data | |
CN113779607B (en) | Industrial data asset management method, system and equipment | |
CN113065961A (en) | Power block chain data management system | |
CN113806699B (en) | Cross-blockchain identity verification method and system in inter-cloud computing environment | |
CN111049806B (en) | Joint authority control method and device, electronic equipment and storage medium | |
CN115883102B (en) | Cross-domain identity authentication method and system based on identity credibility and electronic equipment | |
CN115189965B (en) | Cross-chain management system and cross-chain operation method of block chain | |
CN113660206A (en) | Cross-organization access control method based on alliance chain and multiple signatures | |
CN113079215A (en) | Block chain-based wireless security access method for power distribution Internet of things | |
CN114760071B (en) | Zero-knowledge proof based cross-domain digital certificate management method, system and medium | |
CN115796871A (en) | Resource data processing method and device based on block chain and server | |
CN106713256A (en) | Method for authenticating software and hardware binding of computer special for tax control | |
CN115409511B (en) | Personal information protection system based on block chain | |
CN115021927B (en) | Administrator identity management and control method and system for cryptographic machine cluster | |
Blümke et al. | Authentic batteries: a concept for a battery pass based on PUF-enabled certificates |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |